IT470 week 6

Week 6 discussion topic

Discuss the following…

A) What current dedicated networks are there? Does anyone know how much it cost?

B) Can someone search when to use ring, mesh, star (pick one)? when to use what?

Feel free to show diagrams or videos or animation to help others understand.

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

Telecomm Network Security Assignment

Would need first part of the assignment now. PFA for requirements.

Topic:

Corporation Techs provides remote and on-site support to small and mid-size businesses. Clients use Corporation Techs’ services to solve problems involving malware removal, to manage data recovery and network issues, and to install hardware and software.Due to recent developments, most technical representatives will begin working from home within the next six months. Because Corporation Techs provides 24/7 support, its systems and communications pathways must be fully operational at all times. In addition, the company has been experiencing unprecedented growth and is preparing to double its client-facing staff.You are a junior network architect who is responsible for helping to plan and design network enhancements to create a more secure internal network, and to ensure secure remote access.

Deliverables

The project is divided into several parts. Details for each deliverable can be found in this document. Refer to the course Syllabus for submission dates.

  • Project Part 1: Network Design
  • Project Part 2: Firewall Selection and Placement
  • Project Part 3: Remote Access and VPNs
  • Project Part 4: Final Network Design Report

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

Subject title: object oriented development

  1. Read pages 1 through 108 (intro, observer, decorator sections ) as an introduction to design patterns and meet your first design patterns.
  2. Program an observer pattern independent from the example in the book using a problem space that is interesting to you. 

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

Discussion- AS

 A human resources manager stores a spreadsheet with sensitive personal information on her local workstation. The spreadsheet is the only file with sensitive data, and the name of the spreadsheet does not change.

As a security specialist, you must choose the best form of encryption to protect the spreadsheet. Your choices are:

  • BitLocker
  • BitLocker To Go
  • File encryption via Encrypting File System (EFS)
  • Folder encryption via EFS

Answer the following question(s):

  • Which form of encryption would ensure the spreadsheet is always stored on the disk in encrypted format? More than one form may be correct.

Fully address the question(s) in this discussion; provide valid rationale for your choices, where applicable, be sure to include three questions in your thread, and respond to at least three other students’ questions.

500 words 

APA format with reference needed.

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

Installing Windows and Linux

Part 1

Using VirtualBox create a new Virtual Machine with 2 GB to 4 GB of memory and a 120 GB hard drive (thin provisioned). Using the  Windows Install Media, install Microsoft Windows 10 and create a “local” non-online user account. This is harder than it looks, so you will need to research how on the Internet. Open the text editor in Microsoft Windows (Notepad). Enter the following text: “Hello in Microsoft Windows from FIRSTNAME LASTNAME”, replacing first name and last name with your name. Create a screenshot of the virtual machine using VirtualBox and upload it to this assignment.

Part 2

Using VirtualBox create a new Virtual Machine with 2 GB to 4 GB of memory and a 120 GB hard drive (thin provisioned). Using the Ubuntu Install Media, install Ubuntu LTS with a personal user account. You may need to research how to accomplish this by searching the internet. Open the text editor in Ubuntu (Notepad/gedit). Enter the following text: “Hello in Ubuntu from FIRSTNAME LASTNAME”, replacing first name and last name with your name. Create a screenshot of the virtual machine using VirtualBox and upload it to this assignment.

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

Data Representation

Compute xmin, the column vector with the smallest norm, and xmax, the column vector with the largest norm. (Ties are broken arbitrarily.) If applied to the matrix X above the result should be: xmin = ? 1 0 ? , xmax = ? 2 3 ? . You may assume that a function “norm(x)” exists such that norm(xi) is the norm of xi

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

NETWORK & DATA COMMUNICATION

 

Wireshark Assignment Instructions

Assignment: Wireshark Exploration

I want you to install and run Wireshark, gather some data, and begin to decipher/understand the information it is giving you.  Use the Wireshark Exploration submission link to submit a document including screenshots of you running Wireshark and a detailed description of what the Wireshark output is telling you. Run Wireshark to look at both local network activity and remote network activity. 

I have created a separate Wireshark Getting Started tutorial to help you get started by successfully connecting, capturing, and interpreting to a site and file.

Do not submit the read out or interpretation of the tutorial for your assignment. If you do, you will not receive any points for the assignment. It is just a tutorial to get you acquainted with the most basic feature of Wireshark. After you have run through the tutorial and just looked at your network traffic, work through the activity below and you can filter and see the process of data transmission in layer 2 and 3. 

A good way to get started with this assignment is to ping your Raspberry Pi. So, I would suggest completing the Pie setup assignment prior to completing this Wireshark assignment.

  1. Open Wireshark on the host (should be you laptop or desktop) 
  2. Click the Wi-Fi adapter (assuming you’re not using a wired Ethernet connection). This will start a live capture. 
  3. In the filter box (below the toolbar at the top), type arp or icmp and hit Enter. – this will filter the captured data.
  4. In the command line on the host, ping the IP address of your Pi. 
  5. In Wireshark, you should see an ARP Request, an ARP Reply, as well as four ICMP Echo Requests and Replies. Click the red square icon (second from the left) on the toolbar at the top to stop the capture. 
  6. In the middle Wireshark pane (Packet Details), look for the first ARP, and expand the triangle next to Ethernet_II and the triangle next to Address Resolution Protocol (Request)

Things to note 

  • In the Ethernet frame, the source MAC address is the MAC address of the host machine, and the destination MAC address is the Layer 2 Broadcast Address (12 Fs). 
  • In the ARP (which is encapsulated inside the Ethernet frame), the Sender MAC and Sender IP address belong to the host machine. Also notice that the Target MAC is all 0s (the sender left that field blank), but the Target IP address is that of the Pi. 
  • In the top pane (Packet List), Wireshark turns this into a nice English question in the Info column. 
  • The next frame, below the Packet List, is the response. Compare the fields in the Ethernet frame and the ARP in this response to the frame above, the request. ARP is a pure Layer 2 protocol. It is not routable. There is no IP header. Even though you did see IP addresses in the ARP fields, that does not make it a Layer 3 routable protocol. 

Now that the host machine got the ARP reply, with the MAC address of the Pi, it can send the ICMP Echo Replies. The next 8 rows should be 4 ICMP Echo Requests and 4 ICMP Echo Replies. ICMP is a Layer 3 protocol. 

  1. Select the first ICMP Echo Request. 
  2. Notice how ICMP is encapsulated inside of an IP packet, which is encapsulated inside an Ethernet frame. 
  3. Expand the fields of all protocols, by clicking the triangles. 

Notice with the ICMP Echo Requests that the source MAC address and the source IP address are those of the host machine, while the destination MAC address and the destination IP address are those of the Pi. 

  • For the ICMP Echo Replies, the pairs are reversed. This is local communication. The source determined that the destination was on the same subnet by first logically ANDing its IP address with its subnet mask, and then logically ANDing the destination IP address subnet mask with the source subnet mask. When both resultant network IDs came out the same, the source realized it had to ARP for the MAC address of the actual destination. 

Now try Viewing Remote Communication (not on your local network)

  1. Start a new Wireshark capture by clicking the blue fin (first icon from the left), with the same filter as in Step 3 under Use Wireshark to view network activity (arp or icmp). 
  2. Open up a new command line interface with Administrator privileges, by clicking the Start button, typing cmd, right clicking on the icon, selecting Run As Administrator, and clicking the Yes button. 
  3. At the prompt, type arp -d, which will clear the host’s ARP cache. Then, immediately type ping www.google.com (Links to an external site.). You will have a new set of ARPs and ICMPs. 

In a Word document I want you to try looking at the general traffic on your network, what do you see? Interpret it and use screenshots. Do not just resubmit the tutorial. You can submit the Pi activity above for credit (10pts) but you will need provide additional information about the traffic on your network. So run Wireshark and then try to to explain what you are seeing on your network (10pts).

Next, Ping a remote location (not Google.com or TWU.edu) and use Wireshark to figure out its ip address, MAC address and other components. Again, include screenshots and explain in detail what you see and what you found (10pts).

In your document address the following (10 pts):

  1. Explain what is the difference in ICMP Echo Requests sent from your machine, when pinging a local destination vs. a remote destination.
  2. Explain what is the difference in ICMP Echo Replies sent to your machine, when pinging a local destination vs. a remote destination.

NOTE:  All screenshots should show your application (Wireshark, SSH client, etc.) running in a non-maximized window, and should show part of your desktop background as well as the time/date in the taskbar/menu bar/status bar. 

I have set up an optional discussion folder in Canvas called Wireshark Exploration for you to use to ask questions  and provide insight to each other in the completion of this assignment.  You are NOT required to participate in this discussion (unlike other discussions) as it is just for support in this assignment. Do not post direct answers or tutorials in this discussion.

Submit your document to the submission link titled Wireshark Exploration dropbox on Canvas.

NOTE:  All screenshots should show your application (Wireshark, SSH client, etc.) running in a non-maximized window, and should show part of your desktop background as well as the time/date in the taskbar/menu bar/status bar. 

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

Information Governance

 In order to have a successful IG program, one of the eight (8) Information Risk Planning and Management step is to develop metrics and measure results.   From your required readings as mentioned  below, discuss the value that metrics brings to the organization, and identify critical measures of success that should be tracked. 

  • 2 Pages, 4 References most recent ones.
  • Provide an outside source (for example, an article from the UC Library) that applies to the topic, along with additional information about the topic or the source (please cite properly in APA).
  • Readings:
  • Textbook: Chapter 4 – Information Risk Planning and Management

Textbook: Chapter 5 – Strategic Planning and Best Practices for Information Governance

Tallon, Paul, (2016). Corporate Governance of Big Data: Perspectives on Value, Risk, and Cost. https://ieeexplore.ieee.org/abstract/document/6519236
Click PDF, In Institution name box, enter: University of the Cumberlands, UC OneLogin will pop up and login with UC email address and Password.

Shevde, N, (2018). Measuring Information Governance Success.https://www.cmswire.com/information-management/measuring-information-governance-success

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

Case Study Paper- 250 words

  Read the Module 1 Case Study and answer the following question in a word document and then submit/upload your document. Document format identified below.

Question: In 2015, Google announced the introduction of a new service called Android Pay. Using your favorite search engine or the resources of your library, learn more about Android Pay and, in about 250 words, explain why you think Google decided to develop this new product. In your answer, be sure to consider why Google also decided to continue offering its Google Wallet product.

MODULE 1 CASE STUDY BELOW: 

 Case Study 1:  Digital Wallets on Mobile Devices: Apple and Google One of the fastest-growing segments of the online payments business is mobile payments. U.S. mobile payments are expected to reach $140 billion by 2019 and purchases using mobile devices could account for half of all online retail sales by 2017. Google introduced one of the first digital wallet products that would work on a mobile device in 2011 when it also introduced support for the operation of NFC chips in its Android mobile operating system. Google Wallet stores a MasterCard account for users that agree to maintain a cash balance with the card’s issuing bank, so it operates essentially as a debit card. Google Wallet does not charge a fee to merchants or the MasterCard issuing banks, nor does it charge a transaction fee. Instead, it generates revenue from advertisers who pay to display ads, offer coupons or other promotions (specific ads are displayed based on the mobile device’s proximity to the stores that are making the offers). Google Wallet has been slow to catch on with users. In 2014, Apple introduced a digital wallet product for its mobile devices called Apple Pay. In operation, Apple Pay is similar to Google Wallet; however, the infrastructure and revenue model is different. Apple Pay charges the issuing banks a fee of 0.05 percent of the transaction amount and guarantees each transaction; that is, if the transaction is fraudulent, Apple will cover the loss. Credit card companies normally charge merchants a fee ranging between 2 and 3 percent of the transaction amount, so the additional Apple Pay fee serves as a low-priced insurance plan for them. Consumers will not be charged at all for using Apple Pay and will not be given advertising messages. Further, Apple has stated that it does not collect information about consumer buying habits from Apple Pay data. Apple arranged for American Express, Discover, MasterCard, and Visa credit cards to be included in their system, along with a group of large card-issuing banks. They also included major retailers such as Bloomingdales, Disney, Staples, Walgreens and Whole Foods. These participants will be able to collect data on consumer buying habits, but only on those consumers that use their card or shop at their stores. Apple reported that more than a million credit cards were registered with Apple Pay in the first three days it was available. After Apple Pay’s introduction, an increase in the number of retailers that accept NFC payments (as you learned in this chapter, NFC technology is used by both Google Wallet and Apple Pay) caused an increase in the use of Google Wallet.
 (Schneider 499)  Schneider, Gary. Electronic Commerce, 12th Edition. Cengage Learning, 20160226.   
 

Your word document should have the following;

  • Title page, with your name, class, date, and assignment identifier
  • Body of the paper (one or two pages) double spaced, 12 point font, New Times Roman, 1 inch margins all sides
  • References  should be identified/listed on a separate page (last page of submission). All references must follow APA format.

Save file as casestudy2-FDL in Microsoft word format

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

personal Selling

You are provided with a scenario below.  As a group make a recommendation for the best approach for sales compensation plan based on what little information has been provided:

Scenario #2: The restrictions are being lifted and you now can have a dining room at 50% capacity.  The community is still reluctant to return to in restaurant dining.  You need to have both pickup orders and book the in restaurant service to capacity to meet your minimum margins.  You challenge your staff to come up with ideas and incentives to do so.  What is their plan?

using APA formatting and should include a cover page and reference page with a minimum of 3 resources used.  The cover page and resource page are not included in the page count. 

 please remember to use direct quotations if your citing from any academic souurces. Include the page number as well in the in text-citation. 

References Links:

https://www.lucidchart.com/blog/sales-compensation-plan

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now